123 projects for "network discovery tool" with 2 filters applied:

  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    More flexibility. More control.

    Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 1
    BBOT

    BBOT

    The recursive internet scanner for hackers

    ...BBOT is particularly valuable for security researchers and red teamers who need to automate multi-stage discovery processes across complex infrastructures. Its architecture supports chaining multiple reconnaissance techniques together, enabling continuous discovery rather than one-off scans. The tool balances power and usability by providing sensible defaults while still exposing deep configuration options for advanced users.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 2
    subfinder

    subfinder

    Fast passive subdomain enumeration tool

    Subfinder is a high-performance passive subdomain discovery tool built for fast and reliable asset enumeration. It focuses exclusively on collecting valid subdomains from a wide range of passive online sources, prioritizing accuracy and speed over intrusive scanning techniques. The project is widely used in bug bounty hunting, penetration testing, and attack surface mapping because it minimizes noise while producing actionable results.
    Downloads: 31 This Week
    Last Update:
    See Project
  • 3
    Raccoon

    Raccoon

    High-performance reconnaissance and vulnerability scanning tool

    ...Raccoon can perform DNS enumeration, subdomain discovery, and URL fuzzing to uncover hidden endpoints and infrastructure components. It also integrates network scanning capabilities through tools such as Nmap to detect open ports, services, and potential vulnerabilities. By consolidating these reconnaissance tasks into a single command-line interface, Raccoon aims to streamline the early phases of security testing and provide actionable information for further investigation.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    Metabigor

    Metabigor

    Command-line OSINT and reconnaissance tool without API keys

    ...It can also enrich IP information with service, port, and vulnerability data using Shodan InternetDB while remaining accessible without authentication keys. In addition, it provides utilities that coordinate network scanning workflows by acting as a wrapper for tools like rustscan, masscan, and nmap.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    XRAY

    XRAY

    XRay for recon, mapping and OSINT gathering from public networks

    XRAY is a modular security toolset that helps developers and security professionals analyze, fuzz, and test web applications, protocols, and network services for vulnerabilities. It provides a framework for writing and executing inspection modules that can parse structured data (JSON, XML, HTML), traverse graphs of endpoints, and perform intelligent probing guided by discovered surface area. XRay is typically used as a reconnaissance and vulnerability discovery engine in red-team or app-security workflows: it leverages extensible plugins to adapt to different protocols, inject payloads, and detect common bug classes such as injection flaws, misconfigurations, and unsafe endpoints. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    uncover

    uncover

    Discover exposed internet hosts using multiple search engine APIs

    ...The tool is built with automation in mind, making it suitable for security workflows and pipelines used by penetration testers, researchers, and bug bounty hunters. Instead of manually querying several search engines separately, uncover aggregates results from supported providers and returns them in a standardized format. This approach simplifies large-scale reconnaissance tasks and speeds up the discovery of exposed infrastructure or services.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 7
    discover

    discover

    Automation framework for reconnaissance and penetration testing tasks

    ...The tool is commonly used in Kali Linux environments.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    ASN

    ASN

    Command line ASN lookup, network recon, and traceroute tool

    ...It can also perform AS path tracing, allowing users to observe the network route between systems and identify Internet Exchange Points or anomalies in the path. In addition to its command line usage, asn can run as a web-based traceroute server or as a self-hosted lookup API that returns JSON-formatted data for automated workflows. This flexibility allows the tool to support manual investigations, incident response, and automated network analysis pipelines.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 9
    Argus

    Argus

    Python toolkit for OSINT and reconnaissance with 135+ modules

    Argus is a Python-based open source toolkit designed to simplify information gathering and reconnaissance tasks in cybersecurity. It provides an integrated command-line environment that consolidates numerous reconnaissance utilities into a single framework. The tool enables users to collect data about networks, domains, web applications, and infrastructure in an organized and efficient manner. Argus includes a modular architecture with more than 130 modules that support activities such as...
    Downloads: 6 This Week
    Last Update:
    See Project
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 10
    WhatBreach

    WhatBreach

    OSINT tool for discovering email addresses in known data breaches

    WhatBreach is an open source OSINT (Open Source Intelligence) tool designed to help users discover whether an email address has appeared in known data breaches. It simplifies the process of investigating compromised credentials by allowing users to search for a single email address or analyze multiple email addresses at once. It gathers breach information from various sources and APIs to identify where the email has been exposed in leaked databases or online paste sites. Once breaches are...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    ASNmap

    ASNmap

    CLI tool for mapping organization network ranges using ASN data

    asnmap is a command line tool and Go library designed to quickly map network ranges belonging to organizations using Autonomous System Number (ASN) data. It allows users to convert different types of inputs (such as ASN numbers, IP addresses, domain names, or organization names) into their associated CIDR ranges. This capability makes it particularly useful for security researchers, penetration testers, and reconnaissance workflows that require identifying network infrastructure owned by a target organization. asnmap retrieves ASN-related data and returns structured results that can be easily integrated into automated pipelines. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    geowifi

    geowifi

    OSINT tool for locating WiFi networks using BSSID or SSID data

    geowifi is an open source OSINT tool designed to search and retrieve geolocation information about WiFi networks using their BSSID or SSID identifiers. It queries several public WiFi geolocation databases and aggregates the results to help identify the approximate location of a wireless access point. By combining multiple data sources such as Wigle, Apple, Google, WifiDB, Mylnikov, and Combain, the tool can provide location data that may include coordinates and additional network metadata. ...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 13
    ClatScope

    ClatScope

    OSINT reconnaissance tool for IP, domain, email, and username lookups

    ClatScope is a Python-based OSINT (open source intelligence) utility designed to gather and analyze publicly available information from multiple online sources. It is primarily aimed at investigators, cybersecurity professionals, penetration testers, and researchers who need a centralized platform for reconnaissance tasks. It integrates with numerous public APIs and internet services to retrieve detailed data about IP addresses, domains, email addresses, phone numbers, usernames, and other...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 14
    Findomain

    Findomain

    Fast open source tool for discovering and monitoring domain subdomains

    Findomain is an open source reconnaissance tool designed to discover and enumerate subdomains associated with a target domain. It focuses on speed and reliability by using Certificate Transparency logs and multiple well tested public APIs instead of relying solely on brute force scanning techniques. By querying multiple passive data sources in parallel, the tool can identify a large number of subdomains within a short time, making it useful for security researchers, penetration testers, and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Ligolo-ng

    Ligolo-ng

    An advanced, yet simple, tunneling/pivoting tool

    Ligolo-ng is a simple, lightweight and fast tool that allows pentesters to establish tunnels from a reverse TCP/TLS connection using a tun interface (without the need of SOCKS). When running the relay/proxy server, a tun interface is used, packets sent to this interface are translated and then transmitted to the agent's remote network. You need to download the Wintun driver (used by WireGuard) and place the wintun.dll in the same folder as Ligolo.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 16
    ngrep strives to provide most of GNU grep's common features,applying them to the network layer. ngrep is a pcap-aware tool that will allow you to specify extended regular expressions to match against data payloads of packets. SUPPORT/REPORTING BUGS: please use https://github.com/jpr5/ngrep/issues Thank you!
    Downloads: 13 This Week
    Last Update:
    See Project
  • 17
    Robin

    Robin

    AI-powered tool for dark web OSINT search and investigation

    Robin is an AI-powered open source tool designed to assist investigators and researchers in conducting dark web OSINT (Open Source Intelligence) investigations. It combines automated dark web search capabilities with large language models (LLMs) to analyze and summarize information discovered across hidden services and Tor-based search engines. The tool helps refine investigative queries, collect results from multiple dark web sources, and filter relevant intelligence using AI-driven processing. ...
    Downloads: 18 This Week
    Last Update:
    See Project
  • 18

    Netdisco

    Full-featured enterprise network management tool

    Netdisco is an SNMP-based L2/L3 network management tool designed for moderate to large networks. Routers and switches are polled to log IP and MAC addresses and map them to switch ports. Automatic L2 network topology discovery, display, and inventory.
    Downloads: 19 This Week
    Last Update:
    See Project
  • 19
    pwd.sh

    pwd.sh

    GnuPG symmetric secrets manager using Bash

    ...It supports different modes of password generation, allowing users to customize length, complexity, and character sets. The tool emphasizes privacy by avoiding reliance on external services or network calls, ensuring that password generation happens entirely locally. It is well-suited for developers and security-conscious users who prefer command-line tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Tailsnitch

    Tailsnitch

    A security auditor for Tailscale configurations

    tailsnitch is a security auditing tool for Tailscale networks (tailnets) that scans configurations and device setups to detect risky or overly permissive settings, helping administrators maintain a secure mesh network. Written in Go and designed to be run either as a CLI or integrated into automated pipelines, tailsnitch performs dozens of checks against common access control policies, authentication key practices, network exposure issues, and device security settings. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Flan Scan

    Flan Scan

    A pretty sweet vulnerability scanner

    Flan Scan is a lightweight open-source network vulnerability scanner designed to make it easy to detect exposed services, open ports, and associated vulnerabilities across IP ranges or network segments as part of security audit and compliance workflows. It is essentially a thin wrapper around the widely-used Nmap scanner, augmenting it with scripts and tooling that transform raw Nmap output into vulnerability-focused reports that map detected services to known CVEs, making results more actionable for administrators and auditors. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    OnionSearch

    OnionSearch

    Search multiple Tor .onion engines at once and collect hidden links.

    OnionSearch is a Python-based command-line tool designed to collect and aggregate links from multiple search engines on the Tor network. The script works by scraping results from a variety of .onion search services, allowing users to perform a single query while gathering results from many sources at once. This approach helps researchers and investigators locate hidden services more efficiently without manually querying each individual search engine.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 23
    NExfil

    NExfil

    Fast OSINT tool for discovering web profiles by username

    NExfil is an open source OSINT (Open Source Intelligence) tool designed to locate user profiles across the web based on a given username. Developed in Python, the tool automates the process of checking hundreds of websites to determine whether a specific username exists on those platforms. By performing automated queries across numerous services, NExfil helps investigators, researchers, and security professionals quickly identify potential accounts associated with a particular username. The...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 24
    SecretManager

    SecretManager

    FR : Outil de partage des mots de passe, EN : Sharing tool passwords

    * SecretManager V2 started. *New design and new features ************************************ This tool allows you to store (AES 256) and share passwords. Passwords are placed in groups. Groups are associated with user profiles. Finally, we associate user porfiles with users. So users have access to passwords for which they are authorized. In addition, it is possible to supervise the access to secrets (alarm and all access).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Tranalyzer

    Tranalyzer

    Tranalyzer flow generator packet analyzer moved to: tranalyzer.com

    The Anteater moves to a new site, available under tranalyzer.com. This tool generates extended netflow-like flow/packet statistics from large pcap files or ethernet interfaces. It is intended to serve as a tool for IT troubleshooting, encrypted traffic mining, AI preprocessing and forensic analysis. A packet based "tshark mode" for detailed header and content inspection is improved for troubleshooting and security purposes. Flow based and packet based content inspection and extraction,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB